Real-World Workflows
How developers actually use MeowPass. From solo projects to team deployments to AI agents.
Solo Dev: New Project Setup
You just created a new project. You have API keys from Stripe, a database URL, and an OpenAI key. You want them encrypted and synced.
Day 1: Setup
Daily workflow
Adding a new service
New machine / fresh clone
Key insight
Your .env never goes in git. When you clone on a new machine, mp pull restores it instantly. No Slack messages, no 1Password lookups, no "hey can you send me the .env?"
Team: Onboarding a New Developer
Sarah joins your team on Monday. She needs access to the project's secrets by her first standup.
Team lead (you)
Sarah (new developer)
vs. the old way
Without MeowPass: "Hey can someone DM me the .env?" → 3 hours later, half the keys are wrong, and the DATABASE_URL is for staging. With MeowPass: mp pull → correct secrets, encrypted, audited.
Multi-Environment: Dev → Staging → Production
You have 3 environments with different secrets. You need to switch between them and deploy to each.
Setup: one vault, multiple environments
Switching environments locally
Deploy to production
Incident Response: Rotating Compromised Keys
Your Stripe key leaked in a log. You need to rotate it and re-encrypt the entire vault.
Recovery time
Total time: ~2 minutes. Compare with: update key in 1Password, DM the team on Slack, update 3 CI configs, pray nobody has the old .env cached somewhere.
CI/CD: GitHub Actions Deploy
Your deploy pipeline needs production secrets. You don't want .env files in your repo.
One-time setup
Workflow file
Pre-deploy drift check
AI Agent: Claude Code Managing Secrets
You're coding with Claude Code. You need it to manage secrets without exposing values in the conversation.
Setup (one-time)
Example conversations
"Is my .env up to date?"
→ Claude calls meowpass_diff
→ "Your local .env is missing 2 secrets: REDIS_URL (added 3 days ago) and NEW_FEATURE_FLAG (added yesterday). Run mp pull to sync."
"I just added Stripe to this project. Set up the secrets."
→ Claude detects stripe in package.json
→ Creates placeholders: STRIPE_SECRET_KEY, STRIPE_PUBLISHABLE_KEY, STRIPE_WEBHOOK_SECRET
→ "I've created 3 secret placeholders. Fill them in with your actual Stripe keys."
"Deploy this with production secrets."
→ Claude calls meowpass_run_redacted
→ Secrets injected into deploy command. Output scrubbed — Claude never sees the actual values.
→ "Deployed successfully. 12 secrets injected. Exit code 0."
"What secrets do we have in the production vault?"
→ Claude calls meowpass_list_secrets
→ Returns key names and versions only — no values exposed to the LLM context.
Security model for AI
- • API keys have scopes — create read-only keys for agents
- •
meowpass_run_redactedscrubs all secret values from output - •
meowpass_list_secretsreturns names only, never values - • Every MCP access is logged in the audit trail
- • Revoke a compromised key instantly:
mp apikey revoke <id>
Full Lifecycle: Project Start to Sunset
The complete MeowPass lifecycle for a project from creation to archival.
mp init → vault created, .env encrypted, default setmp run -- npm run dev every morning. Add keys with mp setmp team invite + mp share. New dev runs mp pull → coding in minutesmp export-key → GitHub secrets. meowrithm/meowpass-action@v1 in workflowmp rotate to refresh vault key. mp history to review changes. Check audit logs via APImp rotate. Team runs mp pull. Done in minutes, not hours.mp pull → archive .env. mp vault delete → clean. No orphaned secrets.Agent-Friendly: Building an AI-Powered Dev Workflow
How to set up MeowPass so AI coding agents (Claude Code, Cursor, Windsurf) can safely manage your secrets.
The principle: agents orchestrate, never see values
MeowPass's MCP server gives AI agents 14 tools to manage secrets. The key security feature: agents can list, create, inject, and compare secrets without ever seeing plaintext values.
Setup for Claude Code
What agents can do
| Action | Tool | Values exposed? |
|---|---|---|
| List vaults | meowpass_list_vaults | No |
| List secret names | meowpass_list_secrets | No |
| Check .env drift | meowpass_diff | No (keys only) |
| Scan for .env files | meowpass_init | No |
| Create a vault | meowpass_create_vault | No |
| Run command with secrets | meowpass_run_redacted | No (scrubbed) |
| Decrypt a specific secret | meowpass_decrypt | Yes (requires master pw) |